Skip to main content
Mallory
Mallory

Mobile OS Privacy Features and Advice Content Around Data Privacy Day

data privacy daynotification privacyscreen privacylocation privacyios 26.3app hidingpasswords appapp lockingiphonetelecom surveillancehide my emailcell carriersanti-trackingiossamsung
Updated February 1, 2026 at 05:00 PM6 sources
Mobile OS Privacy Features and Advice Content Around Data Privacy Day

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Apple rolled out a new iOS feature on select recent iPhone and cellular iPad models that, when enabled, reduces the precision of location data shared with a user’s cell carrier, aiming to make it harder for law enforcement, spies, and criminals to obtain precise location via telecom providers. Apple said the change does not reduce location precision shared with apps or with first responders during emergency calls, and initial support is limited to specific devices on iOS 26.3 and a small set of carriers in markets including Germany, Thailand, the UK, and the US; the move lands amid ongoing concerns about carrier targeting and telecom surveillance, including reported China-linked intrusions into major US carriers.

Samsung separately described an upcoming Galaxy privacy feature intended to mitigate “shoulder surfing” by obscuring on-screen content in public settings, with configurable visibility controls for apps, sensitive entry fields, and notification pop-ups. A third item is a generic privacy tips article tied to Data Privacy Day that recaps Apple ecosystem features (e.g., Safari anti-tracking, a Passwords app, Hide My Email, and app hiding/locking) rather than reporting a specific new security event or disclosure.

Related Entities

Affected Products

Related Stories

Mobile Device Security and Privacy Guidance

Security experts and technology journalists have published a range of practical advice and strategies to help users protect their mobile devices and digital privacy. These resources emphasize the importance of operations security (opsec) for all users, including teenagers, and provide step-by-step recommendations for securing smartphones against theft, surveillance, and data compromise. Key measures include recording device identifiers like IMEI numbers, enabling tracking features such as 'Find My' on iOS and Android, using strong screen locks, and tightening lock screen access to prevent unauthorized use. The guidance also highlights the risks associated with default device configurations, the prevalence of tracking by major vendors, and the need for deliberate hardware and software choices to maximize privacy. In addition to technical setup advice, the content addresses broader privacy concerns, such as minimizing digital footprints on social media and streaming platforms, and making informed decisions about device brands and operating systems. Recommendations include opting for devices with long-term security support and unlockable bootloaders, avoiding brands with poor update policies or preinstalled telemetry, and considering privacy-focused alternatives like GrapheneOS or Linux-based phones for advanced users. The overall message is that while perfect privacy is challenging, users can significantly reduce their exposure to threats and surveillance through proactive configuration and awareness of evolving risks in the mobile ecosystem.

3 months ago
Privacy and Encryption Advocacy and Consumer Guidance in Mainstream Tech

Privacy and Encryption Advocacy and Consumer Guidance in Mainstream Tech

The Electronic Frontier Foundation launched **“Encrypt It Already”**, a campaign pressuring major consumer tech providers to expand and complete **end-to-end encryption (E2EE)** commitments and make protections easier to use. The campaign tracks where encryption is promised but not delivered (e.g., E2EE for Facebook group messages, interoperable encrypted RCS messaging promised by **Apple** and **Google**, and E2EE for Bluesky DMs), where encryption exists but is not enabled by default (e.g., Telegram encrypted chats, WhatsApp backups, and Ring camera footage settings), and where additional encrypted storage and controls are being urged (e.g., encrypted backups for Google Authenticator and broader encrypted Android backups). EFF’s stated goal is to shift control of communications and stored data toward users by pushing vendors to ship E2EE features, enable them by default, and broaden encrypted data coverage. Separately, consumer privacy concerns continue to shape adoption and trust in data-collecting devices and platforms. A Clutch survey cited in reporting found **74%** of respondents are concerned about how wearable devices handle personal data, and only **58%** are confident their wearable protects their data—sentiment that may drive brand switching decisions. In parallel, an Apple-focused article on “privacy rules” promoted user configuration steps within the iPhone ecosystem (e.g., Safari anti-tracking features, a dedicated Passwords app, and other privacy controls), but it does not describe a specific incident or vulnerability and reads primarily as general privacy guidance tied to Data Privacy Day.

1 months ago
Debate Over Mobile OS Lockdown Measures to Reduce Malware and Targeted Attacks

Debate Over Mobile OS Lockdown Measures to Reduce Malware and Targeted Attacks

Discussion focused on whether stronger *platform-level restrictions* are necessary to curb mobile threats, contrasting Android’s openness with iOS’s “lockdown” approach. One thread highlights Google’s plan to require centralized **developer registration/verification** for apps installed on Android-certified devices (even if distributed outside Google Play), framed as a way to reduce malware and prevent repeat offenders from re-signing and redistributing blocked apps; it also notes Android’s recent mitigations such as **Restricted Settings** (Android 14) and **Enhanced Confirmation Mode** (Android 15) as partial technical barriers against common scam/phishing tactics. Separately, iOS **Lockdown Mode** is presented as an extreme, reversible hardening option intended for high-risk users (e.g., journalists, activists) that reduces attack surface by disabling or restricting features (e.g., most message attachments/link previews, certain web technologies, incoming FaceTime from unknowns, accessory connections while locked, non-secure Wi‑Fi, and installation of device management profiles). The article cites reporting that a seized journalist phone could not be accessed using law-enforcement forensic tooling when Lockdown Mode was enabled, underscoring how aggressive feature reduction can materially impede both targeted exploitation and post-seizure forensic access.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.